On 05/24/2017 03:51 PM, Chris Laprise wrote:
4.9 is working OK so far. I was using 4.8 prior to this.
Additional note: 4.9 seems to resolve a zombie process issue I was
having with 4.8 (domU), and the 4.9.33-18 security update is working
well so far.
--
Chris Laprise,
On Tuesday, June 20, 2017 at 10:30:40 PM UTC-4, motech man wrote:
> On Monday, September 26, 2016 at 2:40:51 AM UTC-5, Mara Kuenster wrote:
> > Yes, SOME VMs work sometimes ☺.
> >
> > I will just reinstall, it’s better anyway to have no unsupervised downtime
> > between installing qubes and AEM,
On Monday, September 26, 2016 at 2:40:51 AM UTC-5, Mara Kuenster wrote:
> Yes, SOME VMs work sometimes ☺.
>
> I will just reinstall, it’s better anyway to have no unsupervised downtime
> between installing qubes and AEM, especially since I used Windows already on
> the same PC before activating
Hey all,
Trying to update my Ubuntu Xenial template, but hitting following
dependency issue. You can see my attempts to resolve this to no avail:
...
Reading state information... Done
3 packages can be upgraded. Run 'apt list --upgradable' to see them.
user@xenial-desktop:~$ sudo apt list
On Tuesday, June 20, 2017 at 10:42:25 AM UTC-4, Paulo Marques wrote:
> Hi Cooloutac, thanks for yours advice man
>
> "it would require building your own iso or using some kickstart file. I
> believe this has been done before but I'm failing to find it searching the
> mailing list.
>
>
On Tuesday, June 20, 2017 at 8:34:51 PM UTC-5, motech man wrote:
> I'm new to qubes but in my seaches to get up to speed (seems like I'll never
> see the light of day again after starting down the Qubes rabbit hole!) I
> noticed this post and when researching what AEM is found this on the Qubes
I'm new to qubes but in my seaches to get up to speed (seems like I'll never
see the light of day again after starting down the Qubes rabbit hole!) I
noticed this post and when researching what AEM is found this on the Qubes
website:
o - If you are using LUKS with LVM, you must encrypt the
If you're worried about rootkits, the threat looks somewhat different
for Qubes templates and template-based VMs because the templates
themselves are so well protected (essentially read-only most of the time).
The potential threat lay with configuration files stored in /rw
(private.img) which
On 06/20/2017 01:06 PM, slemmigtor...@gmail.com wrote:
Or is this a false positive?
If you 'man xl' you'll see its a Xen command (Qubes runs under Xen). Its
included in my Fedora template so I don't think there is a problem.
Also don't know how a root would have gotten into your
On Tue, Jun 20, 2017 at 10:06:36AM -0700, slemmigtor...@gmail.com wrote:
> Or is this a false positive?
>
It's almost certainly a false positive, triggered by the presence of xl,
and nothing more.
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
On Mon, Jun 19, 2017 at 10:02:04PM -0400, taii...@gmx.com wrote:
> Assuming you don't make any changes yourself, it would also be nice to have
> a "yes/no" popup so you can choose as to if you wish to have a truly
> disposable version.
I'm not quite sure what your point is, because there's a word
Too bad it's (probably) not coming to the desktop, but interesting nonetheless:
https://www.servethehome.com/amd-epyc-7000-series-key-security-virtualization-performance-features/
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
Le 20/06/2017 à 19:49, Reg Tiangha a écrit :
> Curious: Did you install the qubes-usb-proxy package in both sys-usb and
> sys-net templates before attempting to transfer the device?
THanks for the hint, but yes, it is currently installed in the template
used for both sys-usb and sys-net VMs.
ॐ
Le 20/06/2017 à 19:34, Foppe de Haan a écrit :
> Do you know if driver support is included in newer kernels?
I know that recent Mints and Debian do manage this hardware well...
ॐ
--
Swâmi Petaramesh PGP 9076E32E
--
You received this message because you are subscribed
I completely hadn't thought of it that way. Well in that case I will indeed
consider it a feature :) and refocus on more easily restarting it (an older
post this group has already begun to help me with).
Thx!
On Wed, Jun 14, 2017 at 5:38 AM, Unman wrote:
> On Mon,
Is it reasonable to assume that the "unstable" repo doesn't mean "insecure"?
I'm not sure how new I will need to go to to get more support for the Intel 630
integrated graphics. It only provides a single resolution of 1024x768.
Also if I'm going to go thru the trouble of updating prior to the
Revised list of example systems, with corrections, price estimates, citations.
Coreboot with all components open source; fully removed management engine:
* Lenovo X200/T400/T500 w/ Coreboot, CPU: T9600 (dual core, each core about 50%
of a modern i7-7920HQ [2]). Max 8 GB RAM. Cost: 75 USD
On Tuesday, June 20, 2017 at 7:14:04 PM UTC+2, Swâmi Petaramesh wrote:
> Le 20/06/2017 à 17:27, Reg Tiangha a écrit :
> >
>
> > Personally, I'd rather have them leave it in the oven until it's fully
> > baked, rather than to rush it out and then patch heavily later. If it
> > isn't ready yet,
Le 20/06/2017 à 17:27, Reg Tiangha a écrit :
>
> Personally, I'd rather have them leave it in the oven until it's fully
> baked, rather than to rush it out and then patch heavily later. If it
> isn't ready yet, then it isn't ready.
Well, I was not criticizing, I was just asking :-}
I'm a bit
Or is this a false positive?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to
Hello and thanks for reading.
I installed rkhunter, updated it and ran it. It gave me this:
[17:28:20] Checking running processes for suspicious files [ Warning ]
[17:28:20] Warning: The following processes are using suspicious files:
[17:28:20] Command: xl
[17:28:20]UID:
> On Jun 20, 2017, at 11:27 AM, Reg Tiangha wrote:
>
> On 2017-06-20 9:06 AM, Swâmi Petaramesh wrote:
>> Hi there,
>>
>> I've been googling here and there, and couldn't find any release
>> schedule for the upcoming qubes 4.0...
>
> They haven't released one yet and
On 2017-06-20 9:06 AM, Swâmi Petaramesh wrote:
> Hi there,
>
> I've been googling here and there, and couldn't find any release
> schedule for the upcoming qubes 4.0...
>
> Any clue anybody ?
>
> ॐ
>
They haven't released one yet and it will be done when it's done.
Personally, I'd rather
Hi there,
I've been googling here and there, and couldn't find any release
schedule for the upcoming qubes 4.0...
Any clue anybody ?
ॐ
--
Swâmi Petaramesh PGP 9076E32E
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
The only kernel that still functions is the leftover 3.8.17-8 from 3.1. Which
is working fine for now, are there any downsides to continuing to use this?
Going by today's security bulletin[1], which releases a new kernel - it seems
that there may well be downsides.
I wonder how best to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes community,
We have just published Qubes Security Bulletin (QSB) #31:
Xen hypervisor vulnerabilities with unresearched impact (XSA 216-224).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always be
Hi,
Since a week I'm trying to find a secure laptop, without any backdoors or
anything that can jeopardize the security and anonymity of the user.
My last hope was to get a laptop that can handle Libreboot and install QubesOS
on it.
I checked the mailing list and I realized that installing
jkitt:
> Strange.. because I've never had to do that, yet my title bar is
> automagically colored. I think I'm using the package from the testing repo,
> and also the qubes i3 config found on the wiki.
I also have automagically coloring working, I just wanted to be able to edit
the settings
28 matches
Mail list logo